Cloud computing unit 4and5
Cloud computing unit 4and5
Cloud computing unit 4and5
Experts predict that the cloud computing market all around the world will rise
from $371.4 billion in 2020 to $832.1 billion in 2025.
As a result, you must plan, develop, execute, test, release, & sell your product
as soon as possible. And this is despite a scarcity of experienced engineers with
relevant experience. Low-code development & BaaS, for example, significantly
minimize the time required to set up a SaaS development platform.
Ability to Scale
Your app’s performance will be negatively affected if your infrastructure
cannot handle spikes in load. Your clients face financial losses if the mission-
critical SaaS application on which they rely is inaccessible. As a result, your
platform must support both vertical and horizontal scaling. It means you must
add more assets to a single program as needed or automatically start and shut
down different app versions.
Scalability concerns must be considered throughout the design phase. You must
grasp how SaaS apps function to comprehend how SaaS development works for
your project, whether it is scaling up or down your productivity, and much more.
Data Security
To keep your client’s personal information safe and secure, design your
application and use cloud security capabilities. The most basic solution to this
problem is to avoid keeping essential data in plaintext and instead utilize
hashes.
Adaptability
The primary benefit of SaaS apps is that their infrastructure is hosted in the
cloud, eliminating the need for dedicated servers in on-premise or remote data
centers. Amazon Web Services, Microsoft Azure, & Google Cloud backup your
files. Also, it ensures system uptime, guaranteeing that your SaaS is always
accessible.
However, this comes with a large monthly subscription fee, so if you want to save
money, plan on developing and deploying your backup solution.
Efficiencies in Costs
Your customers may be unwilling (or unable) to pay that much for your SaaS.
As a result, you may need to devise a method of making money via selling
subscriptions. Conduct rigorous market research to determine whether your
target market can pay the price of your product.
We help our customers to benefit from the unique characteristics of the cloud-
computing paradigm by adapting the new architectural design patterns to
build cloud aware software services for humans
Cloud Networking
Cloud Networking is service or science in which company’s networking
procedure is hosted on public or private cloud. Cloud Computing is source
manage in which more than one computing resources share identical platform
and customers are additionally enabled to get entry to these resources to
specific extent. Cloud networking in similar fashion shares networking
however it gives greater superior features and network features in cloud with
interconnected servers set up under cyberspace.
Why cloud networking is required and in-demand?
Power Management
While server consolidation and virtualization reduce the amount of
hardware in the data center, they do not always lower energy consumption.
Despite being significantly more efficient, blade servers consume four to five
times the energy of previous data storage technologies.Power and cooling
requirements are becoming more important as equipment requirements change.
Capacity Planning
Maintaining optimum performance requires operating the data center at
maximum capacity. Still, IT managers often leave a margin for error, a
capacity protection gap, to ensure that activities do not suffer interruptions.
Over-provisioning is costly and a waste of computing space, computer
processing power, and electricity.
Mobile Enterprise
Datacenter networking challenges consequently plague mobile computing
service providers and their “personal device” strategies, just as they are by the
security of these devices. Employees have immediate access to business-critical
data through handheld devices, but these devices must remain controlled and
protected.
Real-Time Reporting
The importance of real-time data analytics and reporting is growing. Not
only are DCIM tools used to track physical data center activities, but big data
analytics enables real-time monitoring of irregularities or problems that may
show a security breach or other problem.
1. Open Stack
2. Cloud Stack
3. Apache Mesos
4. Eucalyptus
5. Open Nebula
6. AppScale
1. Open Stack
Open stack is a lot of open source cloud software programming contraptions for
regulating distributed computing stages for public and private clouds. This
programming stage is contained interrelated parts that control grouped, multi-
dealer hardware pools of taking care of, amassing, and frameworks
organization resources all through a server farm. Open Stack could be
regulated through an electronic dashboard, through request line instruments,
or through peaceful web organizations.
2. Cloud Stack
Cloud stack is an open source cloud software platform expected to pass on and
administer immense associations of the virtual machine, as a significantly
available, especially adaptable establishment as an assistance distributed
computing. It’s a java-based undertaking that gives an organization labourer,
and trained professionals (if essential) for hypervisor has so you can likewise
run an iaas cloud. Cloud stack as of now reinforces the most well-known
hypervisors: VMware, kvm, citric XenServer, xen cloud Stage (XCP), Prophet
VM specialist and MS Hyper-v.
• Works with have running xen worker, kvm, Hyper-v, just as VMware esxi with
vsphere .
3. Apache Mesos
Apache mesos is a complete open-source solution that handles occupations
capably in a passed on the environment through ground-breaking resource
sharing just as disconnection. It dynamic PC processor, memory, storing, and
other register resources from machines, enabling issue liberal and adaptable
appropriated structures to be helpfully built and run sufficiently.
Features of Mesos
4. Eucalyptus
Eucalyptus is an open source cloud software storage for building aws-feasible
private and hybrid clouds. It is a Linux based programming designing that
executes versatile private and cross variety cloud inside your present IT
establishment. As and on-premise System as a Help cloud game plan, it licenses
you to use your own collections of resources (hardware, storing, and association)
using a self-organization interface subordinate upon the circumstance.
• Design of Eucalyptus is awes Practical and appropriately has five key parts,
Cloud controller, Walrus, Pack controller, Accumulating controller, Center
controller and Euca2ool.
5. Open Nebula
Open nebula is clear yet mind boggling and versatile turnkey open source
answer for manufacture Private Cloud and regulate Worker ranch
virtualization. It completes IaaS. The chief open-source variation of Open
nebula was conveyed in Walk 2008.
• Asset Offer the chiefs to follow and confine figuring, amassing and frameworks
organization resource utilization
6. AppScale
Appscale is an open source cloud software distributed computing stage that thus
passes on and scales unmodified Google Application Engine applications over
open and private fog systems. It’s a circled programming system that completes
a cloud stage as assistance (PaaS). In light of everything, AppScale is an easy to
-regulate worker less stage for building and for running flexible web and
versatile applications on any establishment. The objective of Appscale is to give
designers a quick, programming interface driven improvement stages that can
run application on any cloud foundation.
Highlights of AppScale:
• Snappy prototyping
1. OpenStack
OpenStack software allows data centers to pool the compute, storage, and
networking resources and manage them through a dashboard or via the
OpenStack API.
2. CloudStack
Apache CloudStack is designed to deploy and manage large networks of virtual
machines. This Apache Project offers a turnkey Infrastructure as a Service
(IaaS) cloud computing platform. It’s used both by public cloud computing
vendors and by organizations running their own private clouds.
3. Eucalyptus
Eucalyptus allows organizations to easily migrate apps and data to build
private or hybrid cloud environments that are compatible with Amazon Web
Services.
4. Synnefo
Synnefo is a complete cloud infrastructure stack that provides Network, Image,
Volume and Storage service. It manages Google Ganetti, OpenStack, and KVM.
5. FOSS-Cloud
The FOSS-Cloud is a Software that enables you to create your own Private or
Public Cloud. It is an integrated infrastructure to provide cloud-Services,
Windows or Linux based SaaS. FOSS-Cloud covers all of the aspects of an
Open Source IT environment.This multi-faced cloud computing solution
includes virtualization, cloud desktop, IaaS, PaaS and SaaS capabilities.
6. openQRM
openQRM software manages a data center’s infrastructure to build private,
public and hybrid IaaS (Infrastructure as a Service) clouds. This enterprise-
class tool combines data center management system administration and IaaS
provisioning into a single tool.
7. OpenShift
OpenShift’s helps you to make your job easier by taking care of all the messy IT
aspects of app development and allows you to focus on your job by Coding your
Application and satisfying your customers.
8. Cloud Foundry
Cloud Foundry is used to deploy your applications on a variety of
infrastructures, including Amazon Web Services, OpenStack, and vSphere. It
supports Java, Ruby, and Node applications out of the box.
9. Docker
Docker provides a highly reliable, low-cost way to quickly build, ship, and run
distributed applications at scale. It gives developers the freedom to define
environments and create apps faster and easier and flexibility for IT ops to
quickly respond to change.
10. Salt Stack
SaltStack software is easy enough to get running in seconds, scalable enough to
manage tens of thousands of servers, and fast enough to control and
communicate with them in milliseconds. SaltStack delivers a dynamic
infrastructure communication bus used for remote execution, configuration
management and much more.
There are often reasonable pay-per-use pricing models for this software, but
smaller applications and companies using their own infrastructure might not
want hosted offerings.
1. OpenShift
OpenShift is a PaaS solution developed by the Red Hat community. It was
originally launched in 2011 and has quickly become one of the most widely used
PaaS solutions on the market.
2. Dokku
Dokku advertises itself as “the smallest PaaS implementation you’ve ever seen,”
but that doesn’t mean it offers few features. The product was launched in 2013
as an open-source project by Docker.
What users are saying: Out of all solutions on this list, Dokku has acquired the
most real user reviews on G2 Crowd. Most users recommend this PaaS solution,
regarding its installation time as "really fast," a tool focused on simplicity, and
rich with features.
3. Cloud Foundry
Cloud Foundry is an open source software project. The software was originally
developed by VMWare, then transferred to Pivotal and open sourced in 2014.
Since then, it has quickly become one of the most widely used PaaS solutions on
the market.
What users are saying: Most user reviews on G2 Crowd agree that Cloud
Foundry thrives at streamlining application development. One flaw users have
pointed out is that the documentation isn't as clear or comprehensive as
preferred.
4. Flynn
Flynn is a cloud PaaS and container management solution that’s been around
since 2013. The self-hosted tool has built in Postgres, MySQL,
and MongoDB databases.
Features: Flynn comes with a web dashboard and tools to monitor logs and
automate deployments and scaling. It also offers services to manage clouds and
clusters for you if your team doesn’t have the bandwidth to do it themselves.
What users are saying: Flynn has only acquired a few user reviews on G2 Crowd,
and the one common theme amongst these reviews is that the solution shows
potential, but is still in development.
There are many services available for you, namely, ‘proposal writing, code
development, paper writing, publishing, and also thesis writing.’
Your code execution part is so special for you since it is a super chance for our
customers to get error-free codes. Further, our developers are experts in all the
simulation tools. Hence, we can also develop your Cloud Computing Open
Source Projects in any version of the simulation tool. Furthermore, all our
services are reliable and also secure at a low cost.
CloudSim
iCanCloud
GroundSim
CloudAnalyst
GreenCloud
EMUSIM
iFogSim
DCSim (Data Centre Simulation)
UNIT - 5
Cloud Computing Security
Security in cloud computing is a major concern. Data in cloud should be stored
in encrypted form. To restrict client from accessing the shared data directly,
proxy and brokerage services should be employed.
Security Planning
Before deploying a particular resource to cloud, one should need to analyze
several aspects of the resource such as:
Select resource that needs to move to the cloud and analyze its sensitivity to
risk.
Consider cloud service models such as IaaS, PaaS, and SaaS. These models
require customer to be responsible for security at different levels of service.
Consider the cloud type to be used such as public, private,
community or hybrid.
Understand the cloud service provider's system about data storage and its
transfer into and out of the cloud.
The risk in cloud deployment mainly depends upon the service models and
cloud types.
Understanding Security of Cloud
Security Boundaries
A particular service model defines the boundary between the responsibilities of
service provider and customer. Cloud Security Alliance (CSA) stack model
defines the boundaries between each service model and shows how different
functional units relate to each other. The following diagram shows the CSA
stack model:
Communication
Security incidents
Network security
Risk management
Data management
FedRAMP
HITRUST
ISO 27017
PCI
All companies face security risks, threats, and challenges every day. Many
think these terms all mean the same thing, but they’re more nuanced.
Understanding the subtle differences between them will help you better
protect your cloud assets.
Let’s consider an example: An API endpoint hosted in the cloud and exposed
to the public Internet is a risk, the attacker who tries to access sensitive data
using that API is the threat (along with any specific techniques they could try),
and your organization’s challenge is effectively protecting public APIs while
keeping them available for legitimate users or customers who need them.
You cannot completely eliminate risk; you can only manage it. Knowing
common risks ahead of time will prepare you to deal with them within your
environment. What are four cloud security risks?
Attack surface can also include subtle information leaks that lead to an
attack. For example, CrowdStrike’s team of threat hunters found an attacker
using sampled DNS request data gathered over public WiFi to work out the
names of S3 buckets. CrowStrike stopped the attack before the attackers did
any damage, but it’s a great illustration of risk’s ubiquitous nature. Even
strong controls on the S3 buckets weren’t enough to completely hide their
existence. As long as you use the public Internet or cloud, you’re
automatically exposing an attack surface to the world.
2. Human Error
According to Gartner, through 2025, 99% of all cloud security failures will be
due to some level of human error. Human error is a constant risk when
building business applications. However, hosting resources on the public
cloud magnifies the risk.
The cloud’s ease of use means that users could be using APIs you’re not aware
of without proper controls and opening up holes in your perimeter. Manage
human error by building strong controls to help people make the right
decisions.
One final rule — don’t blame people for errors. Blame the process. Build
processes and guardrails to help people do the right thing. Pointing fingers
doesn’t help your business become more secure.
3. Misconfiguration
Cloud settings keep growing as providers add more services over time. Many
companies are using more than one provider.
Providers have different default configurations, with each service having its
distinct implementations and nuances. Until organizations become proficient
at securing their various cloud services, adversaries will continue to
exploit misconfigurations.
4. Data Breaches
The impact of data breaches depends on the type of data stolen. Thieves sell
personally identifiable information (PII) and personal health information
(PHI) on the dark web to those who want to steal identities or use the
information in phishing emails.
1. Zero-Day Exploits
2. Advanced Persistent Threats
3. Insider Threats
4. Cyberattacks
1. Zero-day Exploits
APTs aren’t a quick “drive-by” attack. The attacker stays within the
environment, moving from workload to workload, searching for sensitive
information to steal and sell to the highest bidder. These attacks are
dangerous because they may start using a zero-day exploit and then go
undetected for months.
3. Insider Threats
4. Cyberattacks
SaaS Security
SaaS Security refers to securing user privacy and corporate data in
subscription-based cloud applications. SaaS applications carry a large amount
of sensitive data and can be accessed from almost any device by a mass of users,
thus posing a risk to privacy and sensitive information.
Risk Management
Now, let us briefly understand each step of the risk management process in
cloud computing.
1. Identify the risk - The inception of the risk management process starts
with the identification of the risks that may negatively influence an
organisation's strategy or compromise cloud system security.
Operational, performance, security, and privacy requirements are
identified. The organisation should uncover, recognise and describe risks
that might affect the working environment. Some risks in cloud
computing include cloud vendor risks, operational risks, legal risks, and
attacker risks.
2. Analyze the risk - After the identification of the risk, the scope of the risk
is analyzed. The likelihood and the consequences of the risks are
determined. In cloud computing, the likelihood is determined as the
function of the threats to the system, the vulnerabilities, and
consequences of these vulnerabilities being exploited. In analysis phase,
the organisation develops an understanding of the nature of risk and its
potential to affect organisation goals and objectives.
3. Evaluate the risk - The risks are further ranked based on the severity of
the impact they create on information security and the probability of
actualizing. The organisation then decides whether the risk is acceptable
or it is serious enough to call for treatment.
4. Treat the risk - In this step, the highest-ranked risks are treated to
eliminate or modified to achieve an acceptable level. Risk mitigation
strategies and preventive plans are set out to minimise the probability of
negative risks and enhance opportunities. The security controls are
implemented in the cloud system and are assessed by proper assessment
procedures to determine if security controls are effective to produce the
desired outcome.
5. Monitor or Review the risk - Monitor the security controls in the cloud
infrastructure on a regular basis including assessing control
effectiveness, documenting changes to the system and the working
environment. Part of the mitigation plan includes following up on risks to
continuously monitor and track new and existing risks.
This section involves the primary risks associated with cloud computing.
When it comes to data, the cloud poses a variety of risks that the
enterprise must address as part of its security strategy. The biggest risks—as
organizations increasingly rely on the cloud for collecting, storing, and
processing critical data—are cyberattacks and data breaches.
A SailPoint survey, for example, found that 45% of companies that have
implemented IaaS have experienced cyberattacks and 25% have experienced a
data breach. Other research found that IT security professionals cite the
proliferation of cloud services as the second-biggest barrier to their ability to
respond to a data breach, and this challenge has grown in recent years.
Application Security
Application security is the process of developing, adding, and testing
security features within applications to prevent security vulnerabilities against
threats such as unauthorized access and modification.
Types of application security